Results 41 to 50 of about 373,921 (174)

Risks and remedies in e-learning system

open access: yes, 2012
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core   +1 more source

Enhancing IDS performance through a comparative analysis of Random Forest, XGBoost, and Deep Neural Networks

open access: yesMachine Learning with Applications
Intrusion Detection Systems (IDS) face major challenges in network security, notably the need to combine a high detection rate with reliable performance.
Sow Thierno Hamidou, Adda Mehdi
doaj   +1 more source

Buffer or Enabler? The Effect of Financial Slack on R&D Investment in Different Environments

open access: yesSystems
Prior studies have shown mixed findings on the role of financial slack. This study examines how environmental factors such as munificence, dynamism, and complexity moderate the relationship between financial slack and innovation activity. Using data from
Hye Kyung Yu, Minji Kim, Tohyun Kim
doaj   +1 more source

Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments

open access: yesIEEE Open Journal of the Industrial Electronics Society
In recent years, concepts and components of information technology (IT) have made their way into the shop floor, today better known as operational technology (OT).
Mukund Bhole   +2 more
doaj   +1 more source

Enhancing Security and Authenticity in Immersive Environments

open access: yesInformation
Immersive environments have brought a great transformation in human–computer interaction by enabling realistic and interactive experiences within simulated or augmented spaces.
Rebecca Acheampong   +4 more
semanticscholar   +1 more source

Integrated Dynamic Power Management Strategy with a Field Programmable Gate Array-Based Cryptoprocessor System for Secured Internet-of-Medical Things Networks

open access: yesTechnologies
Advancements in electronics and sensor technologies are driving the deployment of ubiquitous sensor networks across various applications, including asset monitoring, security, and networking.
Javier Vázquez-Castillo   +7 more
doaj   +1 more source

Cybersecurity economics - balancing operational security spending

open access: yesInformation Technology and People, 2019
Purpose The purpose of this paper is to demonstrate how to find the optimal investment level in protecting an organisation’s assets. Design/methodology/approach This study integrates a case study of an international financial organisation with various
Stale Ekelund, Z. Iskoujina
semanticscholar   +1 more source

A proposed case for the cloud software engineering in security [PDF]

open access: yes, 2014
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core  

Mining known attack patterns from security-related events

open access: yesPeerJ Computer Science, 2015
Managed Security Services (MSS) have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS), malware propagation, and anomalies.
Nicandro Scarabeo, B. Fung, R. Khokhar
semanticscholar   +1 more source

Asymptotic Methods for Asset Market Equilibrium Analysis [PDF]

open access: yes
General equilibrium analysis is difficult when asset markets are incomplete. We make the simplifying assumption that uncertainty is small and use bifurcation methods to compute Taylor series approximations for asset demand and asset market equilibrium. A
Kenneth L. Judd, Sy-Ming Guu
core  

Home - About - Disclaimer - Privacy